-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 To ensure the image has not been corrupted in transmit or tampered with, perform the following two steps to cryptographically verify image integrity: 1. Verify the authenticity of this file by checking that it is signed with our GPG release key: $ curl https://keybase.io/turnkeylinux/pgp_keys.asc | gpg --import $ gpg --list-keys --with-fingerprint release@turnkeylinux.com pub 2048R/A16EB94D 2008-08-15 [expires: 2023-08-12] Key fingerprint = 694C FF26 795A 29BA E07B 4EB5 85C2 5E95 A16E B94D uid Turnkey Linux Release Key $ gpg --verify debian-8-turnkey-omeka_14.2-1_amd64.tar.gz.hash gpg: Signature made using RSA key ID A16EB94D gpg: Good signature from "Turnkey Linux Release Key " For extra credit you can validate the key's authenticity at: https://keybase.io/turnkeylinux 2. Recalculate the image hash and make sure it matches your choice of hash below. $ sha256sum debian-8-turnkey-omeka_14.2-1_amd64.tar.gz f7538aa2cbffacf4fe6b770d61432f6f2665e916524dc68402e10fd1fad5415a debian-8-turnkey-omeka_14.2-1_amd64.tar.gz $ sha512sum debian-8-turnkey-omeka_14.2-1_amd64.tar.gz 10211577946d99f4ebae6ca78250f5b45422409b7d301cefc96206e26bb546715fa29c73647c91b015a4f25ab05249adb9638b7f30872fe4d7245fba52030028 debian-8-turnkey-omeka_14.2-1_amd64.tar.gz Note, you can compare hashes automatically:: $ sha256sum -c debian-8-turnkey-omeka_14.2-1_amd64.tar.gz.hash debian-8-turnkey-omeka_14.2-1_amd64.tar.gz: OK $ sha512sum -c debian-8-turnkey-omeka_14.2-1_amd64.tar.gz.hash debian-8-turnkey-omeka_14.2-1_amd64.tar.gz: OK -----BEGIN PGP SIGNATURE----- iQEcBAEBCAAGBQJZeIKkAAoJEIXCXpWhbrlNt7oH/2Xw5ES2n80fkT+uHTgVhG12 A92HzTB0aQSE+kTAgztOn67j5Y/f4dl5UQao6rZOAmtzZa/ns1b1jpmrvth0IRvB eGSL5U53ValYDbe0JArYl9GO366jsM2Xh88ci6H6jsyPc7T+VvqHpjDHW9xEIA28 hEOp/GHPk36De+g9dBkJprvF0gThdlVsu8wJ3EtEeXqePJ7DFAakja3PGT05lWrv yLaUqcG++1et3Y0THFHOgd+WyuXhz0IOMY8HhY2QQd/w3iV53ve6cV7j2pEsl5+H lZZpVs1o7eFGEy+R+9LR3dsM72QAXGsDxOwLfF9XAl9zuzzZOIlXHzPaE0QuY2w= =R74O -----END PGP SIGNATURE-----